Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Fabio Massimo Zennaro"'
Autor:
Fabio Massimo Zennaro, László Erdődi
Publikováno v:
IET Information Security, Vol 17, Iss 3, Pp 441-457 (2023)
Abstract Penetration testing is a security exercise aimed at assessing the security of a system by simulating attacks against it. So far, penetration testing has been carried out mainly by trained human attackers and its success critically depended o
Externí odkaz:
https://doaj.org/article/6bea086b3ef1496b835d55ccecd805b5
Autor:
Fabio Massimo Zennaro, László Erdődi
Publikováno v:
International Journal of Information Security. 21:293-309
Website hacking is a frequent attack type used by malicious actors to obtain confidential information, modify the integrity of web pages or make websites unavailable. The tools used by attackers are becoming more and more automated and sophisticated,
Autor:
Manuel Del Verme, Åvald Åslaugson Sommervoll, László Erdődi, Simone Totaro, Fabio Massimo Zennaro
Publikováno v:
Secure IT Systems ISBN: 9783030916244
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96d194636fb09c7bbeedbe01148db0f0
https://doi.org/10.1007/978-3-030-91625-1_6
https://doi.org/10.1007/978-3-030-91625-1_6
Autor:
Magdalena Ivanovska, Pedro G. Lind, Fabio Massimo Zennaro, Anis Yazidi, Enrique Herrera Viedma
Publikováno v:
Digibug. Repositorio Institucional de la Universidad de Granada
instname
European Journal of Operational Research
instname
European Journal of Operational Research
The work of Enrique Herrera Viedma was supported by the Spanish State Research Agency under Project PID2019-103880RB-I00/AEI/10.13039/501100011033.
Preference aggregation in Group Decision Making (GDM) is a substantial problem that has received
Preference aggregation in Group Decision Making (GDM) is a substantial problem that has received
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f7e86fbfb59d27520bbb709b56ede6e
Publikováno v:
IEEE BigData
Threat detection of weapons and aggressive behavior from live video can be used for rapid detection and prevention of potentially deadly incidents such as terrorism, general criminal offences, or even domestic violence. One way for achieving this is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::61ebc9ad41ba4f760d4733ab65fd51a9
http://arxiv.org/abs/2012.09662
http://arxiv.org/abs/2012.09662
Autor:
Fabio Massimo Zennaro
Publikováno v:
ECML PKDD 2020 Workshops ISBN: 9783030659646
PKDD/ECML Workshops
PKDD/ECML Workshops
In this paper we discuss the political value of the decision to adopt machine learning in the field of criminal justice. While a lively discussion in the community focuses on the issue of the social fairness of machine learning systems, we suggest th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b3b046b62292f5f8207d0c9ae049a9da
https://doi.org/10.1007/978-3-030-65965-3_7
https://doi.org/10.1007/978-3-030-65965-3_7
Autor:
Fabio Massimo Zennaro
Publikováno v:
Machine Learning and Knowledge Discovery in Databases ISBN: 9783030438869
PKDD/ECML Workshops (2)
PKDD/ECML Workshops (2)
In this paper we offer a preliminary study of the application of Bayesian coresets to network security data. Network intrusion detection is a field that could take advantage of Bayesian machine learning in modelling uncertainty and managing streaming
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a201cbd20ac119451c968b56e01a4bb
https://doi.org/10.1007/978-3-030-43887-6_16
https://doi.org/10.1007/978-3-030-43887-6_16
Publikováno v:
Journal of Information Security and Applications. 61:102903
In this paper, we propose a formalization of the process of exploitation of SQL injection vulnerabilities. We consider a simplification of the dynamics of SQL injection attacks by casting this problem as a security capture-the-flag challenge. We mode
Publikováno v:
EISIC
In recent years we have seen an upsurge in terror attacks around the world. Such attacks usually happen in public places with large crowds to cause the most damage possible and get the most attention. Even though surveillance cameras are assumed to b
Publikováno v:
Multi-Agent Systems ISBN: 9783030141738
EUMAS
EUMAS
In this paper we study the problem of making predictions using multiple structural causal models defined by different agents, under the constraint that the prediction satisfies the criterion of counterfactual fairness. Relying on the frameworks of ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1370df88fa75f5f7d00e38d28c23ff30
https://doi.org/10.1007/978-3-030-14174-5_17
https://doi.org/10.1007/978-3-030-14174-5_17